Topics for Bachelor and Master Theses
| General Information | |
|---|---|
| Time of Start | Anytime |
| Language | English preferred |
| Period | Bachelor Thesis: 12 weeks; Master thesis: 20 weeks |
| Application | Please send an E-Mail with your preferred topic to the mentioned supervisor. Please add in any case your CV and up to date grade sheet from FlexNow (simple printout) in order to find a suitable topic that matches your area of interest. |
| Own Suggestions | You can also send your own suggestions to a suitable supervisor from our team. |
| Contact for General Questions | Kristin Masuch |
Available Topics (Bachelor):
| State-of-the-Art and Best Practices in the Development of Health Information Systems | |
|---|---|
| Description | Details |
| Method | Structured Literature review |
| Contact | Gilbert Hövel |
Available Topics (Master):
| Do you ever come out of the basement?“ Qualitative Analysis of User-Involvement in the Development of Health Information Systems | |
|---|---|
| Description | Details |
| Method | Expert interviews & Interview analyzation methods |
| Contact | Gilbert Hövel |
| People are not the same: Examining human-centered IT security interventions beyond their average impact | |
|---|---|
| Method | Experiment and quantile regressions |
| Contact | Prof. Dr. Simon Trang |
| Suggestions from Dr. Ilja Nastjuk | |
|---|---|
| Research Areas | IT security and impacts on human psychology Technostress in the context of in-vehicle information systems/dating portals/further areas The dark side of digitalization User acceptance of technologies |
| Application | Please send me your CV and up to date grade sheet from FlexNow (simple printout) in order to find a suitable topic that matches your area of interest. |
| Contact | Dr. Ilja Nastjuk |
| Development and evaluation of employee-centric IT security competence profiles | |
|---|---|
| Description | Details |
| Method | Design Science, i.e. develop and evaluate security competence facets and roles |
| Contact | Kristin Masuch |
| Development and evaluation of IT security competence measurement instrument | |
|---|---|
| Description | Details |
| Method | Scale developement (includes development of tests and quantitative empirical evaluation) |
| Contact | Kristin Masuch |
| The impact of data breaches on market value: A contingency perspective | |
|---|---|
| Description | Details |
| Method | Event Study Methodology (methods will be taught as part of the supervision) |
| Data | Secondary data collection (commercial and open databases) |
| Contact | Kristin Masuch |
| Evaluation of the use of cyber insurances in SMEs | |
|---|---|
| Method | Literature Review, Expert Interviews |
| Contact | Florian Schütz |
| Design of competence development tracks in the domain of IT-safe behaviour | |
|---|---|
| Method | Expert Interviews, Design Science |
| Contact | Florian Schütz |